67
Toward Trustworthy Identification Systems November 8, 2010 Lynette I. Millett, Senior Program Officer Computer Science and Telecommunications Board National Research Council

Toward Trustworthy Identification Systems

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Toward Trustworthy Identification Systems
Page 2: Toward Trustworthy Identification Systems
Page 3: Toward Trustworthy Identification Systems
Page 4: Toward Trustworthy Identification Systems
Page 5: Toward Trustworthy Identification Systems
Page 6: Toward Trustworthy Identification Systems

Data and Backend Systems(Not just “IDs”)

• Would consolidation of other databases be necessary?

• Centralization creates a single target for adversaries

• What are the risks from denial of service attacks

• How are potential privacy invasions mitigated if correlative capabilities allowed?

• What are the tracking, surveillance, and prediction requirements?• Is high availability necessary? What are the implications?• What backups and redundancy would be necessary?• Differing levels of access and query capabilities for different users? • Procedurally, how would maintenance and administration work?

6

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 6

Page 7: Toward Trustworthy Identification Systems

Major Findings from Authentication study

• Context, scope, implementation matter greatly • Local contexts/uses usually more

sensitive to privacy considerations• Secondary uses are particularly

problematic• Toolkit for thinking through design is provided• Checklist for evaluating/designing authentication

systems is presented

7

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 7

Page 8: Toward Trustworthy Identification Systems

When Designing a Privacy-Sensitive Authentication System• Authenticate only for necessary, well-defined purposes• Minimize the scope of data collected• Minimize the retention interval of data collected• Articulate what entities will have access to the collected

data• Articulate what kinds of access to and use of the data

will be allowed• Minimize the intrusiveness of the process• Overtly involve the individual to be authenticated in the process• Minimize the intimacy of the data collected • Ensure that the use of the system is audited and that the audit

record is protected against modification and destruction• Provide for individuals to check on and correct information held and

used for authentication8

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 8

Page 9: Toward Trustworthy Identification Systems

Biometric Recognition: Challenges and Opportunities

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 9

Page 10: Toward Trustworthy Identification Systems

10

Charge*• Provide a comprehensive assessment of biometrics that

examines current capabilities, future possibilities, and the role of government in their development.

• Explore the technical and policy challenges associated with the development, evaluation, and use of biometric technologies and systems that incorporate them.

• Examine associated research challenges and identify a multi-and inter-disciplinary research agenda to begin to meet them.

• Examine multiple stakeholders and points of view on multiple technologies, applications, and implementation issues

* Project sponsors: DHS, DARPA, CIA, NSF

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 10

Page 11: Toward Trustworthy Identification Systems

11

Whither Biometrics Committee• JOSEPH N. PATO, Hewlett-Packard Labs, Chair• BOB BLAKLEY, Gartner• JEANETTE BLOMBERG, IBM Almaden Research Center• JOSEPH P. CAMPBELL, Massachusetts Institute of Technology, Lincoln Laboratory• GEORGE T. DUNCAN, Carnegie Mellon University• GEORGE R. FISHER, Prudential-Wachovia (retired)• STEVEN P. GOLDBERG, Georgetown University Law Center*• PETER T. HIGGINS, Higgins & Associates, International• PETER B. IMREY, Cleveland Clinic and Case Western Reserve University• ANIL K. JAIN, Michigan State University• GORDON LEVIN, Disney• LAWRENCE D. NADEL, Noblis• JAMES L. WAYMAN, San Jose State University

• LYNETTE I. MILLETT, CSTB Study Director

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 11

Page 12: Toward Trustworthy Identification Systems

12

Committee Approach• Be neutral with respect to application and technology

wherever possible

• Take a broad systems view• Consider issues at scale• Acknowledge privacy issues, but focus on engineering and

cultural considerations• Learn from information security community• Informed by previous NRC work• Informed by related forensic efforts

– But focused on automated biometric recognition, not forensic applications

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 12

Page 13: Toward Trustworthy Identification Systems

Principal Conclusions

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 13

Page 14: Toward Trustworthy Identification Systems

14

Recognize Inherently Probabilistic Nature of Systems

• Biometric systems operate with uncertainty at nearly every stage of system operation

• Some fraction of interactions will produce incorrect or indeterminate results

• Error and exception processing critical to system success

• Qualitatively different from traditional discrete information system bugs or glitches

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 14

Page 15: Toward Trustworthy Identification Systems

15

Rigorous Systems Approach Necessary for Success

• Biometric components are embedded in larger socio-technical systems– Environment, operations, adjudication mechanisms,

policy choices, requirements, data management, user interfaces, maintenance, . . .

• Effectiveness depends as much on social context as it does on technical & engineering factors

• Biometric systems should be designed and evaluated relative to their specific intended purposes and contexts rather than generically or in isolation.

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 15

Page 16: Toward Trustworthy Identification Systems

16

Scientific Basis Needs Strengthening

• The distinctiveness of biometric characteristics is not well understood at global population scales.– Develop a science of human individual

distinctiveness• The effects of human behavior and interaction

on large-scale biometric system performance (and vice versa) is not well explored.

• Numerous opportunities for research – see Chapter 5

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 16

Page 17: Toward Trustworthy Identification Systems

17

A Well-Designed Biometric System• Takes into account that recognition is based on similarity and

probabilistic not absolute matching; presumptions and burdens of proof are correspondingly conservative

• Anticipates a lifecycle corresponding to changes in presentation distributions, stability of traits, and technology

• Assesses the reliability of information associated with a recognition independently of the confidence in correct recognition

• Provides exception handling as robust as the primary biometrics process and handles errors gracefully, without violating dignity, privacy or due process rights

• Publicly states explicit security, privacy and policy goals

• Recognizes that biometric traits are inherently not secret and will minimize risks to privacy and of misrecognition arising from this fact

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 17

Page 18: Toward Trustworthy Identification Systems

Fundamental Concepts

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 18

Page 19: Toward Trustworthy Identification Systems

19

Definition

• Biometrics is the automated recognition of individuals based on their behavioral and biological characteristics.*

*ISO/IEC JTC1/SC37 Standing Document 2: Harmonized Biometric Vocabulary

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 19

Page 20: Toward Trustworthy Identification Systems

20

Fundamental Dogma

• An individual is more similar to him- or herself over time than to anyone else.

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 20

Page 21: Toward Trustworthy Identification Systems

21

Grounded Fundamental Dogma

• An individual is more likely similar to him-or herself over time than to anyone else likely to be encountered.

… to some degree of confidence

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 21

Page 22: Toward Trustworthy Identification Systems

22

Stability and Distinctiveness

• Some traits appear stable over time, while others can change significantly even over short periods of time.

• Underlying distinctiveness and stability of biometric traits are not well understood at large scales.

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 22

Page 23: Toward Trustworthy Identification Systems

Numerous Sources of Uncertainty

• Physical change in person over time• Interface & environment change• Motivation & social factors• Processed features

– Noisy data, sensors, algorithms• Data integrity

Biometric systems perform decision-makingunder uncertainty

23

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 23

Page 24: Toward Trustworthy Identification Systems

24

Error Rates Can be Misleading

• Error rates capture component and system performance in a narrow sense– FAR, FRR– FMR, FNMR

• Confidence in system behavior depends not just on error rates, but also relies on knowing prior probability of a false claim.– FMR and FNMR say very little without the base rate

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 24

Page 25: Toward Trustworthy Identification Systems

Confidence in Recognition Decisions

• College dorm access control scenario– 0.1% FMR– 0.1% FNMR

• Imposters attempt to gain access by posing as a legitimate resident

• Confidence in rejections depends on imposter base rate and declines with a reduction in the number of imposters

25

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 25

Page 26: Toward Trustworthy Identification Systems

91% Confidence With10 Imposters per 1000

26

11 Nonmatches;91 percent correct

1,000 Candidates

50Rows

990 Residents

1 False nonmatch

10 Nonresident impostors

10 True nonmatches

0.1% FMR 0.1% FNMR

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 26

Page 27: Toward Trustworthy Identification Systems

50% Confidence With 1 Imposter per 1000

27

2 Nonmatch50 percent Correct

1,000 Candidates

50Rows

999 Residents

1 False nonmatch1 True nonmatch

1 Nonresident impostor

0.1% FMR 0.1% FNMR

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 27

Page 28: Toward Trustworthy Identification Systems

0% Confidence With 0 Imposters per 1000

28

0.1% FMR

1 False nonmatch

1,000 Residents

1 Nonmatch0 percent correct

1,000 Candidates

50Rows

0 Nonresident impostors

0 True nonmatches

0.1% FNMR

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 28

Page 29: Toward Trustworthy Identification Systems

Similar Issues for Watchlists• What confidence to have in a match when users

are presenting to be checked against a watchlist – Most will not match– Need prior probability of expected matches to know

what confidence to have in match

• Increasing size of watchlist cannot be expected to improve all aspects of system performance

• As watch list size increases we should be less confident that a match is correct– with implications for the push towards

increased interoperability29

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 29

Page 30: Toward Trustworthy Identification Systems

Engineering Biometric Systems in Context

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 30

Page 31: Toward Trustworthy Identification Systems

31

System Life-Cycle Considerations

• Issues for all systems– Training– Commissioning – Component fault replacement– Decommissioning

• Issues for large scale, long-lived systems– Technology refresh – hardware and software– Data quality, currency, & integrity– Changes in target population– Evolving threat models– Policy flexibility

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 31

Page 32: Toward Trustworthy Identification Systems

32

Immediate Operational Contexts

• Operational requirements and choices affect system design decisions and system effectiveness– User Context– Application Context– Technology Context– Performance Context

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 32

Page 33: Toward Trustworthy Identification Systems

33

User ContextParameter <Less Challenging

More Challenging>

Data SubjectAwareness Very Not veryMotivation Cooperative Indifferent UncooperativeTraining Well trained Not veryHabituation Very Not very

Party Benefiting Both User / Consumer Owner / Agency

= Thumb access to PDA= Access to Elbonian Fitness Center= Elbonian border watch list

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 33

Page 34: Toward Trustworthy Identification Systems

34

Application ContextParameter <Less Challenging

More Challenging>

Supervision Direct Remote NoneClaim type Positive NegativeRecognition type Verification One to few Identification

= Thumb access to PDA= Access to Elbonian Fitness Center= Elbonian border watch list

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 34

Page 35: Toward Trustworthy Identification Systems

35

Technology ContextParameter <Less Challenging

More Challenging>

Environment Controlled VariableEngagement Active Passive with

cooperationPassive

Sample Capture Overt CovertDataset Proprietary Open Standards

= Thumb access to PDA= Access to Elbonian Fitness Center= Elbonian border watch list

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 35

Page 36: Toward Trustworthy Identification Systems

36

Performance ContextParameter <Less Challenging

More Challenging>

Throughput Low Medium HighSensitivity to error rate

Low Medium High

= Thumb access to PDA= Access to Elbonian Fitness Center= Elbonian border watch list

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 36

Page 37: Toward Trustworthy Identification Systems

37

These Contexts Matter

• Stating that a system is a “biometric system” or uses “biometrics” says little– … about what the system is for or– … how difficult it is to successfully implement

or– … its likelihood of successful deployment

Research needed: Taxonomy of systems & design implications

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 37

Page 38: Toward Trustworthy Identification Systems

Biometric Systems and Trustworthiness

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 38

Page 39: Toward Trustworthy Identification Systems

39

Typical Security Goals in Biometric System

• Determine that an observed trait belongs to a living human who is present and acting intentionally

• Accurate comparison of the observed trait to reference data maintained in the system (within desired confidence levels)

• Backend data security, integrity, etc.

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 39

Page 40: Toward Trustworthy Identification Systems

Trustworthiness

• Model threats to understand potential points of attack and estimate probability of attack

• Assume biometric traits are public information

• Manage the trustworthiness of the entire recognition process

40

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 40

Page 41: Toward Trustworthy Identification Systems

Multiple Potential Targets

• Resource being protected by biometric system– will have particular vulnerabilities and likely

threats separate from mode of protection

• Biometric system itself– will have particular vulnerabilities and likely

threats separate from what it’s protecting

• Both drive analysis and decisions about how best to provide overall security

41

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 41

Page 42: Toward Trustworthy Identification Systems

Social, Cultural, and Legal Implications

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 42

Page 43: Toward Trustworthy Identification Systems

43

Interaction Between Systems & Individuals

• Motivating participation by individuals– Clear benefits for participants– Limits on system uses

• Facilitating individual participation– Planning for diversity– Ease of use (beyond sensor interface)– Graceful exception handling and

accommodations for failures

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 43

Page 44: Toward Trustworthy Identification Systems

44

Societal Impact

• Community acceptance is influenced by sense of proportionality related to perceived or actual side effects – Universality and the potential for disenfranchisement– Potential for record linkage and the loss of anonymity– Covert surveillance and the potential for abuse of

power– Constraints on individuality and identity

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 44

Page 45: Toward Trustworthy Identification Systems

45

Legal Issues• Remediation

– Identity fraud by falsifying, altering, or concealing biometric traits– Inappropriate denial of due process rights resulting from improper

recognition– Responsibility of system operators to minimize misuse of biometric

samples

• Reliability– Effects of depiction of technology in popular culture– Role of expert testimony and Frye & Daubert standards

• Privacy– Legal issues overlap (but do not encompass) cultural issues; both

matter

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 45

Page 46: Toward Trustworthy Identification Systems

Information Sharing• Information sharing is attractive

– Administrative efficiencies & business purposes– Research uses

• Information sharing requires caution– Biometric data are personally identifiable information– Biometric data can serve to correlate disparate databases (to a

degree of confidence)– Access to data may allow discovery of doppelgangers or

discovery of enrolled users

46

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 46

Page 47: Toward Trustworthy Identification Systems

Data Policies• Guidance from 2002 IDs – Not That Easy

remains relevant– What is the purpose?– What is the scope of the population?– What is the scope of the data?– Who would be the users?– What types of use?– Is participation mandatory?– What legal structures protect integrity, privacy

and due process?

47

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 47

Page 48: Toward Trustworthy Identification Systems

Research Opportunities & Public Policy Considerations

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 48

Page 49: Toward Trustworthy Identification Systems

49

Technical and Engineering Research Opportunities

• Distinctiveness and stability of underlying phenomena – both absolutely and under common conditions of capture

• Modality-related– Sensors, segmentation, invariant representation, robustness

• Human factors and affordance• Testing and evaluation

– Test data– Usability Testing

• Information & system security• Scale – numbers, geography, time, and so on

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 49

Page 50: Toward Trustworthy Identification Systems

Social Science Research Opportunities

• Individuals– Performance & effectiveness– Behaviors & affordance

• Society– Social impacts, direct and indirect– Community acceptance

• Develop data that predict how well a system will perform– Experimental studies– Field studies, ethnography

50

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 50

Page 51: Toward Trustworthy Identification Systems

51

Public Policy Considerations• Feasibility of large-scale deployment

– Does existing technology adequately satisfy the well defined problem?

– Do deployment plans integrate adequate risk management?– Does national origin of technology create undue risk?– Is there an adequate biometrics workforce?

• Are social impact assessments helpful?• Do deployments represent serious potential for identity theft?• Can authoritarian regimes exploit human recognition; how

could such a risk be mitigated?• What considerations limit or facilitate research use of biometric

data?

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 51

Page 52: Toward Trustworthy Identification Systems

Dependable Software SystemsSufficient Evidence?

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 52

Page 53: Toward Trustworthy Identification Systems

Software, Systems, and Demonstrating Dependability

• Biometrics has automated components– …therefore biometric systems are software

systems (among other things), and thus… – …general lessons in developing robust

software systems apply.

• How to demonstrate reliability of mission-critical systems?

• How to evaluate whether a system is dependable (meeting its stated goals)?

53

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 53

Page 54: Toward Trustworthy Identification Systems

What We KnowAbout Software Systems

• Extent of failures to date– software has already resulted in critical system failures– death, injury and major economic loss

• Roots of failure– bugs in code account only for 3% of failures blamed on software– most failures blamed on interactions with operators, environment– often poor understanding of requirements

• Development strategies– building dependable software is difficult and costly– quality is highly variable– certification regimes and standards have mixed record

54

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 54

Page 55: Toward Trustworthy Identification Systems

What We Don’t Know• Incomplete and unreliable data about

– extent and frequency of software failures– efficacy of development approaches– benefits of certification schemes

• Consequences– mandating particular process does not guarantee

dependability– avoid being too prescriptive about particular tools or

techniques– put in place mechanisms for collecting industry-wide

evidence– make evidence focus of dependable system development

55

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 55

Page 56: Toward Trustworthy Identification Systems

Three E’s for Dependable Software Systems

• Be explicit– properties established– assumptions about domain and usage– level of dependability

• Develop and present evidence– dependability case that properties hold– scientifically justifiable claims– open to audit by a third-party

• Exploit expertise– approach is technology-independent– demand for evidence stretches today’s best practices– deviate from best practice only with good reason

56

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 56

Page 57: Toward Trustworthy Identification Systems

CSTB on Cybersecurity and Trustworthiness• Critical Code: Software Producibility for Defense (2010) assesses the growing importance of software for national security and examines how the U.S. Department of Defense can most effectively meet its future software needs.• Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options (2010) examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks.• Biometric Recognition: Challenges and Opportunities (2010) presents a broad and comprehensive assessment of biometric recognition systems -- articulating design and operational considerations as well as outlining a research agenda to bolster the scientific and engineering underpinnings of these systems.• Toward Better Usability, Security, and Privacy of Information Technology (2010) identifies research opportunities and ways to embed usability considerations in design and development related to security and privacy, and vice versa.• Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009) concludes that although cyberattack capabilities are an important asset for the United States, the current policy and legal framework for their use is ill-formed, undeveloped, and highly uncertain and that U.S. policy should be informed by an open and public national debate on technological, policy, legal, and ethical issues they pose.• Toward a Safer and More Secure Cyberspace (2007) explores the nature of online threats, considers some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and offers a strategy for future research aimed at countering cyber attacks.• Software for Dependable Systems: Sufficient Evidence? (2007) discusses how the growing use and complexity of software necessitates a different approach to dependability and recommends an evidence-based approach to achieving greater dependability and confidence.• Who Goes There? Authentication Through the Lens of Privacy (2003) describes and examines issues, concepts, and techniques for authentication from the perspective of how they implicate privacy—and how adverse impacts on privacy might be contained.• Critical Information Infrastructure Protection and the Law: An Overview of Key Issues (2003) discusses antitrust, FOIA, and liability as factors in protecting critical information infrastructure, given technical and economic conditions.• IDs -- Not That Easy: Questions About Nationwide Identity Systems (2002) outlines challenging policy, process, and technological issues presented by nationwide identity systems.• Cybersecurity Today and Tomorrow: Pay Now or Pay Later (2002) Recaps highlights from past CSTB security reports with a focus on issue identification and practical guidance.• Trust in Cyberspace (1999) provides an assessment of the state of the art procedures for building trustworthy networked information systems; proposes directions for research in computer and network security, software technology, and system architecture; and assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help.• Realizing the Potential of C4I: Fundamental Challenges (1999) addresses the intersecting arenas of security, interoperability, and DOD culture and processes as they relate to challenges in command, control, communications, computers, and intelligence.• Cryptography's Role in Securing the Information Society (1996) describes the growing importance of encryption, relating a government interests to interests in the spread and control of encryption, and recommends policy changes.• Computers at Risk: Safe Computing in the Information Age (1991), an enduring primer for information security, explains key concepts and terms, outlines the technology and procedures that give rise to and can alleviate security problems, relates security to complementary concerns such as privacy and safety, and describes the private and public sector institutional contexts.

57

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 57

Page 58: Toward Trustworthy Identification Systems

Distinctive Nature of Biometric Systems and Problem Space

• Similar to… medical diagnostics, digital authentication systems, manufacturing production lines, mission-critical tightly-coupled software systems, information kiosks…

… but not strictly analogous to any of the above

• And poised to address major public policy challenges……while interacting with large portions of the population……about complex personal notions of identity, privacy, and privilege.

58

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 58

Page 59: Toward Trustworthy Identification Systems

Acknowledge and Embrace

• Acknowledge the importance of what is being asked of this technology– … especially when used at scale for broad

security or public policy goals

• Embrace the challenges inherent– … in multidisciplinary research – deep science,

hard engineering, social aspects, and– … in deploying reliable, broadly-trusted systems.

59

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 59

Page 60: Toward Trustworthy Identification Systems

Questions?

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 60

Page 61: Toward Trustworthy Identification Systems

61

For more information…

Joe Pato, Committee Chair, [email protected] Millett, Study Director, [email protected]

www.cstb.org

Reports available at: www.nap.edu

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 61

Page 62: Toward Trustworthy Identification Systems

Extra Slides

62

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 62

Page 63: Toward Trustworthy Identification Systems

Operational Overview

63

CompareReferences

ReferenceDatabase

Match

Non-MatchAction

CaptureSample

MatchAction

Subject presents biometric

characteristic

Sensor

Capture Matcher Action

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 63

Page 64: Toward Trustworthy Identification Systems

Lessons from Other Large-Scale Systems

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 64

Page 65: Toward Trustworthy Identification Systems

Lessons from Other Large-Scale Systems

• Many factors contributing to the success of large-scale systems are not unique to biometric systems

• Opportunity to cross-fertilize biometrics community with expertise from other domains such as: information security, medical diagnostics, manufacturing, systems engineering

• Key success factors for large-scale systems:– Good project management– Alignment of capabilities with underlying need and operational

environment– Thorough threat and risk analysis

• Common contributors to failures:– Inappropriate technology choices– Lack of sensitivity to user perceptions and needs– Poor understanding of population issues– Lack of a viable business case

65

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 65

Page 66: Toward Trustworthy Identification Systems

66

Medical Diagnostics

• Individual components in general usage are rarely as sensitive and specific as under testing

• Confirming a test by repetition is less valuable than confirming it by a different test

• Limitations in individual components can vitiate the effectiveness of others.

• Effectiveness of a system is highly population-specific

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 66

Page 67: Toward Trustworthy Identification Systems

67

Manufacturing• System objectives must be clear and competing

priorities resolved• The full range of the operational environment should

be anticipated• Ongoing operational testing and blind challenges of

operational systems • Biometric systems may be considered a production

line– Individuals presenting for recognition are input– High quality decisions are output

NSF Workshop on Fundamental Research Challenges for Trustworthy Biometrics 2010

Lynette Millett 67